Latest Articles

[img_assist|nid=4470|title=|desc=|link=none|align=right|width=100|height=100]Google has released version 4.1.249.1059 of Chrome for Windows, a security update that addresses four high risk vulnerabilities in its WebKit-based browser. These vulnerabilities are; a memory corruption issue in Chrome’s V8 JavaScript Engine, type confusion errors with forums, cross-site scripting (XSS) vulnerabilities on the Chrome downloads page and HTTP request errors that could lead to possible cross-site request forgeries (XSRF). Read the full article. [The H Security]

[img_assist|nid=4420|title=|desc=|link=none|align=left|width=100|height=100]According to research, the malicious iframe used in the latest Network Solutions attack pointed to corpadsinc.com which then downloads Adobe exploits onto victims’ machines. The hacks raise an issue increasingly being faced by Website owners: what’s the responsibility of the ISP or service or cloud provider to provide more application-layer security?

[img_assist|nid=4466|title=|desc=|link=none|align=right|width=100|height=100]A pair of security researchers has discovered a number of new attack vectors that give them the ability to not only locate any GSM mobile handset anywhere in the world, but also find the name of the subscriber associated with virtually any cellular phone number, raising serious privacy and security concerns for customers of all of the major mobile providers.

[img_assist|nid=4465|title=|desc=|link=none|align=left|width=100|height=100]Google is investigating a growing number of reports that hackers are breaking into legitimate Gmail accounts and then using them to send spam messages. The problem started about a week ago but seems to have escalated over the past few days. Read the full article. [IDG News Service]

[img_assist|nid=4467|title=|desc=|link=none|align=right|width=100|height=100]Researchers at the Univeristy of Texas at Dallas have developed a method for analyzing the activity log files of corporate firewalls. Their analysis can determine what rules the firewall is actually applying to incoming and outgoing network traffic and then compare these with the original rules to spot errors and omissions. Read the full article. [Science Daily]

The SANS Institute has released critical security controls for cyber defense agreed to by a consortium of agencies including: “NSA, US Cert, DoD, DoD JTF-GNO, the Department of Energy Nuclear Laboratories, Department of State, DoD Cyber Crime Center plus the top commercial forensics experts and pen testers that serve the banking and critical infrastructure communities,” according to the SANS website. Read the SANS Institute consensus audit guidelines.

In the second quarter of 2015 Kaspersky Lab solutions detected and repelled a total of 379,972,834 malicious attacks from online resources. There were 5,903,377 registered notifications about attempte...

Innovative technologies are conquering the financial market, opening up new opportunities for startups. The volume of investment in projects for the banking sector is constantly growing, as is its pot...